Today, I’m pleased to announce the overall availability of community exercise occasions for Amazon Virtual Private Cloud (Amazon VPC) endpoints in AWS CloudTrail. This characteristic lets you document and monitor AWS API exercise traversing your VPC endpoints, serving to you strengthen your information perimeter and implement higher detective controls.
Previously, it was laborious to detect potential information exfiltration makes an attempt and unauthorized entry to the sources inside your community by VPC endpoints. While VPC endpoint insurance policies could possibly be configured to stop entry from exterior accounts, there was no built-in mechanism to log denied actions or detect when exterior credentials have been used at a VPC endpoint. This typically required you to construct customized options to examine and analyze TLS visitors, which could possibly be operationally pricey and negate the advantages of encrypted communications.
With this new functionality, now you can decide in to log all AWS API exercise passing by your VPC endpoints. CloudTrail data these occasions as a brand new occasion kind known as community exercise occasions, which seize each management airplane and information airplane actions passing by a VPC endpoint.
Network exercise occasions in CloudTrail present a number of key advantages:
- Comprehensive visibility – Log all API exercise traversing VPC endpoints, whatever the AWS account initiating the motion.
- External credential detection – Identify when credentials from exterior your group are accessing your VPC endpoint.
- Data exfiltration prevention – Detect and examine potential unauthorized information motion makes an attempt.
- Enhanced safety monitoring – Gain insights into all AWS API exercise at your VPC endpoints with out the necessity to decrypt TLS visitors.
- Visibility for regulatory compliance – Improve your capability to fulfill regulatory necessities by monitoring all API exercise passing by.
Getting began with community exercise occasions for VPC endpoint logging
To allow community exercise occasions, I am going to the AWS CloudTrail console and select Trails within the navigation pane. I select Create path to create a brand new one. I enter a reputation within the Trail title area and select an Amazon Simple Storage Service (Amazon S3) bucket to retailer the occasion logs. When I create a path in CloudTrail, I can specify an current Amazon S3 bucket or create a brand new bucket to retailer my path’s occasion logs.
If you set Log file SSE-KMS encryption to Enabled, you may have two choices: Choose New to create a brand new AWS Key Management Service (AWS KMS) key or select Existing to decide on an current KMS key. If you selected New, it’s essential to kind an alias within the AWS KMS alias area. CloudTrail encrypts your log information with this KMS key and provides the coverage for you. The KMS key and Amazon S3 should be in the identical AWS Region. For this instance, I exploit an current KMS key. I enter the alias within the AWS KMS alias area and go away the remaining as default for this demo. I select Next for the subsequent step.
In the Choose log occasions step, I select Network exercise occasions beneath Events. I select the occasion supply from the checklist of AWS providers, similar to cloudtrail.amazonaws.com
, ec2.amazonaws.com
, kms.amazonaws.com
, s3.amazonaws.com
, and secretsmanager.amazonaws.com
. I add two community exercise occasion sources for this demo. For the primary supply, I choose ec2.amazonaws.com
possibility. For Log selector template, I can use templates for widespread use circumstances or create fine-grained filters for particular eventualities. For instance, to log all API actions traversing the VPC endpoint, I can select the Log all occasions template. I select Log community exercise entry denied occasions template to log solely entry denied occasions. Optionally, I can enter a reputation within the Selector title area to establish the log selector template, similar to Include community exercise occasions for Amazon EC2.
As a second instance, I select Custom to create customized filters on a number of fields, similar to eventName and vpcEndpointId. I can specify particular VPC endpoint IDs or filter the outcomes to incorporate solely the VPC endpoints that match particular standards. For Advanced occasion selectors, I select vpcEndpointId from the Field dropdown, select equals as Operator, and enter the VPC endpoint ID. When I broaden the JSON view, I can see my occasion selectors as a JSON block. I select Next and after reviewing the choices, I select Create path.
After it’s configured, CloudTrail will start logging community exercise occasions for my VPC endpoints, serving to me analyze and act on this information. To analyze AWS CloudTrail community exercise occasions, you should utilize the CloudTrail console, AWS Command Line Interface (AWS CLI), and AWS SDK to retrieve related logs. You can even use CloudTrail Lake to seize, retailer and analyze your community exercise occasions. If you might be utilizing Trails, you should utilize Amazon Athena to question and filter these occasions primarily based on specific standards. Regular evaluation of those occasions can assist you preserve safety, adjust to rules, and optimize your community infrastructure in AWS.
Now out there
CloudTrail community exercise occasions for VPC endpoint logging give you a robust device to boost your safety posture, detect potential threats, and achieve deeper insights into your VPC community visitors. This characteristic addresses your vital wants for complete visibility and management over your AWS environments.
Network exercise occasions for VPC endpoints can be found in all industrial AWS Regions.
For pricing data, go to AWS CloudTrail pricing.
To get began with CloudTrail community exercise occasions, go to AWS CloudTrail. For extra data on CloudTrail and its options, consult with the AWS CloudTrail documentation.